Statements (28)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:malware
|
| gptkbp:abilities |
command and control
remote access data exfiltration |
| gptkbp:alsoKnownAs |
gptkb:Agent.BTZ
|
| gptkbp:category |
backdoor
trojan |
| gptkbp:developedBy |
gptkb:Turla_group
|
| gptkbp:discoveredBy |
2007
|
| gptkbp:exfiltrates |
documents
system information |
| gptkbp:notableBattle |
US military networks 2008
|
| gptkbp:notableFeature |
modular architecture
encrypted communication stealth techniques |
| gptkbp:notableRelease |
2017 version with email-based C2
|
| gptkbp:persistenceMechanism |
registry modification
scheduled tasks |
| gptkbp:platform |
gptkb:Microsoft_Windows
|
| gptkbp:relatedTo |
gptkb:Turla_malware_family
|
| gptkbp:usedBy |
gptkb:Turla_group
|
| gptkbp:usesC2Channel |
gptkb:HTTP
|
| gptkbp:variant |
gptkb:Agent.BTZ
|
| gptkbp:writtenBy |
gptkb:C++
|
| gptkbp:bfsParent |
gptkb:TA-64
|
| gptkbp:bfsLayer |
5
|
| https://www.w3.org/2000/01/rdf-schema#label |
ComRAT malware
|